pidgin/pidgin
Clone
Summary
Browse
Changes
Graph
Clear conversation typing source ID in callback
release-2.x.y
2021-11-05, Mohammed Sadiq
ee34beb053a0
Clear conversation typing source ID in callback
Since the callback is run only once, the source ID should be
set to 0 so that the source ID won t be an invalid value.
This avoids a GLib critical on removing the invalid Source ID
Testing Done:
Build and run pidgin and verified that the GLib warning has gone in logs
Reviewed at https://reviews.imfreedom.org/r/1123/
/* purple
*
* Purple is the legal property of its developers, whose names are too numerous
* to list here. Please refer to the COPYRIGHT file distributed with this
* source distribution.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA
*/
#include
<string.h>
#include
<glib.h>
#include
"../xmlnode.h"
gint
LLVMFuzzerTestOneInput
(
const
guint8
*
data
,
size_t
size
);
gint
LLVMFuzzerTestOneInput
(
const
guint8
*
data
,
size_t
size
)
{
gchar
*
malicious_xml
=
NULL
;
gchar
*
str
;
xmlnode
*
xml
;
if
(
!
g_utf8_validate_len
((
const
gchar
*
)
data
,
size
,
NULL
))
{
return
0
;
}
malicious_xml
=
g_new0
(
gchar
,
size
+
1
);
memcpy
(
malicious_xml
,
data
,
size
);
malicious_xml
[
size
]
=
'\0'
;
xml
=
xmlnode_from_str
(
malicious_xml
,
-1
);
if
(
xml
==
NULL
)
{
g_free
(
malicious_xml
);
return
0
;
}
str
=
xmlnode_to_str
(
xml
,
NULL
);
if
(
str
==
NULL
)
{
xmlnode_free
(
xml
);
free
(
malicious_xml
);
return
0
;
}
g_free
(
str
);
xmlnode_free
(
xml
);
g_free
(
malicious_xml
);
return
0
;
}